Sciweavers

2691 search results - page 85 / 539
» Security in Ad Hoc Networks
Sort
View
SAJ
2002
127views more  SAJ 2002»
15 years 1 months ago
Limited flooding protocol for mobile ad hoc networks
Mobile ad hoc networks are collections of mobile nodes without any fixed infrastructure or central co-ordinating mechanism for packet routing. Consequently, routing is a challenge...
Mieso K. Denko, W. Goddard
IJACI
2010
164views more  IJACI 2010»
15 years 13 days ago
Exploring Multi-Path Communication in Hybrid Mobile Ad Hoc Networks
Abstract. Ambient computing requires the integration of multiple mobile heterogeneous networks. Multi-path communication, in such scenarios, can provide reliability and privacy ben...
Roberto Speicys Cardoso, Mauro Caporuscio
PERCOM
2007
ACM
16 years 1 months ago
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
COORDINATION
2007
Springer
15 years 8 months ago
Object-Oriented Coordination in Mobile Ad Hoc Networks
Abstract. We introduce an object-oriented referencing abstraction to express coordination between objects hosted on mobile devices interconnected by a wireless ad hoc network. On t...
Tom Van Cutsem, Jessie Dedecker, Wolfgang De Meute...
ICDCIT
2007
Springer
15 years 8 months ago
Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks
This paper considers the problem of unicasting in wireless ad hoc networks. Unicasting is the problem of finding a route between a source and a destination and forwarding the mess...
Rohit Ashok Khot, Ravikant Poola, Kishore Kothapal...